Showing 1 - 20 results of 40 for search 'Feng-hua LI', query time: 0.04s
Refine Results
-
1
Development trends of the information technology and cyberspace security by Feng-hua LI
Published 2015-12-01
Article -
2
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01
Article -
3
Representation model of structured document for multilevel security by Mang SU, Feng-hua LI, Guo-zhen SHI, Li LI
Published 2012-09-01
Article -
4
Research progress on location privacy-preserving techniques by Sheng WAN, Feng-hua LI, Ben NIU, Zhe SUN, Hui LI
Published 2016-12-01
Article -
5
Research progress of access control model and policy in online social networks by Tian-zhu CHEN, Yun-chuan GUO, Ben NIU, Feng-hua LI
Published 2016-08-01
Article -
6
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
7
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
8
Research progress on location privacy-preserving techniques by Sheng WAN, Feng-hua LI, Ben NIU, Zhe SUN, Hui LI
Published 2016-12-01
Article -
9
Research on scenario-based mechanism in privacy-aware mobile networks by Ben NIU, Feng-hua LI, Jia-feng HUA, Yuan-yuan HE
Published 2015-12-01
Article -
10
Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Published 2016-04-01
Article -
11
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01
Article -
12
Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG
Published 2016-04-01
Article -
13
Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Published 2016-10-01
Article -
14
Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO
Published 2014-11-01
Article -
15
Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN
Published 2016-10-01
Article -
16
Review of semantic-based privacy-preserving approaches in LBS by Ming-jie MA, Yue-jin DU, Feng-hua LI, IUJia-wen L
Published 2016-12-01
Article -
17
Research on privacy protection in the process of information exchange by Jia-feng HUA, Feng-hua LI, Yun-chuan GUO, Kui GENG, Ben NIU
Published 2016-03-01
Article -
18
Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI
Published 2017-06-01
Article -
19
Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG
Published 2016-08-01
Article -
20
Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI
Published 2017-06-01
Article